IMA   1997 Institute of Mathematics and its Applications International Conference
Wall of Fame | Most Viewed IMA-1997 Paper
211views Cryptology» more  IMA 1997»
12 years 5 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source211
2Download preprint from source106
3Download preprint from source105
4Download preprint from source88